Various systems and methods for encrypting data are disclosed. In one aspect, the method includes receiving a memory address and a value to be written in the memory address. The method also includes encrypting the value using the memory address as an initial value for an encryption process. The method also includes storing the encrypted value in the memory address.
|
22. A computer-implemented method comprising:
receiving a burst access request including a memory address and a plurality of encrypted values, wherein the encrypted values are read from a plurality of consecutive memory addresses of a memory, one for each value, starting from the memory address;
truncating the memory address by truncating a number of the least significant bits of the memory address, the number of least significant bits being equal to the number of consecutive memory addresses;
decrypting each encrypted value using the truncated memory address as an initial value for a decryption process; and
providing the decrypted values to a processor.
1. A computer-implemented method comprising:
receiving a burst access request including a memory address and a plurality of values to be written at a plurality of consecutive memory addresses in a memory, one for each value, starting from the memory address;
truncating the memory address by truncating a number of the least significant bits of the memory address, the number of least significant bits being equal to the number of consecutive memory addresses;
encrypting each value using the truncated memory address as an initial value for an encryption process; and
storing the encrypted values in the memory at the consecutive memory addresses starting from the memory address.
11. A system comprising:
a processor configured for generating a burst access request including a memory address for a protected memory location and a plurality of values to be written at a plurality of consecutive memory addresses, one for each value, starting from the memory address;
an encryption module coupled to the processor and configured for encrypting each of the values using an encryption process that is initialized by a truncated memory address truncated by a number of the least significant bits of the memory address, the number of least significant bits being equal to the number of consecutive memory addresses; and
a memory controller coupled to the encryption module for writing the encrypted values to the consecutive memory addresses starting from the memory address.
2. The computer-implemented method of
storing a predefined value in four least significant bits of the memory address, wherein the predefined value comprises a value of four 0s or four 1s.
3. The computer-implemented method of
storing a predefined value in one or more bits of the memory address.
4. The computer-implemented method of
5. The computer-implemented method of
encrypting the memory address; and
encrypting each value using the encrypted memory address.
6. The computer-implemented method of
7. The computer-implemented method of
8. The computer-implemented method of
9. The computer-implemented method of
scrambling the memory address prior to encrypting the values; and
encrypting the scrambled memory address using a pseudo random value.
10. The computer-implemented method of
12. The system of
13. The system of
14. The system of
15. The system of
encrypting the at least a portion of the memory address; and
encrypting the data using the encrypted memory address.
16. The system of
19. The system of
scramble the memory address prior to initializing the encryption process; and
encrypt the scrambled memory address using a pseudo random value.
21. The system of
23. The computer-implemented method of
storing a predefined value in four least significant bits of the memory address, wherein the predefined value comprises a value of four 0s or four 1s.
24. The computer-implemented method of
storing a predefined value in one or more bits of the memory address.
25. The computer-implemented method of
26. The computer-implemented method of
encrypting the memory address; and
decrypting the encrypted values using the encrypted memory address.
27. The computer-implemented method of
28. The computer-implemented method of
29. The computer-implemented method of
30. The computer-implemented method of
scrambling the memory address prior to encrypting the value; and
encrypting the scrambled memory address using a pseudo random value.
|
This disclosure relates generally to electronics, and more particularly to encrypted memories.
An increasing number of devices include digital memories. For example, smart phones, cell phones, set top boxes, Global Positioning System (GPS) receivers, point of sale systems and computers use digital memories. These devices can store various personal data or other sensitive information. As a result, there is a growing need to protect the information stored in these devices.
One attempt to address security concerns related to the digital memories and/or the devices that include the digital memories is to encrypt the digital memory. Some conventional encryption methods impose data size restrictions or order restrictions. For example, some encryption methods limit memory accesses to a fixed size (e.g., all memory accesses are 128 bit) or require that data be processed in the same order (e.g., data chaining). Other conventional encryption methods can incur large processing overhead which can lower the bandwidth of the memory accesses. One drawback to encrypting digital memory using the conventional techniques is that memory accesses can be random. For example, the order in which memory is accessed can be random and the size of memory being accessed (e.g., byte, word, etc.) can be random.
An encryption module can receive a memory address and a data value to be written into the memory address. The data value can be encrypted using the memory address as an initial value for an encryption process. The data value can then be stored in the memory at the memory address.
In some implementations, a method comprises: receiving a memory address and a data value, wherein the data value is to be written in the memory address; encrypting the data value using the memory address as an initial value for an encryption process; and storing the encrypted data value in the memory address.
In some implementations, a system includes a processor configured for generating a memory address for a protected memory location. The system also includes an encryption module coupled to the processor and configured for encrypting data using an encryption process that is initialized by at least a portion of the memory address. The system also includes a memory controller coupled to the encryption module for writing the encrypted data to the protected memory location.
In some implementations, a method includes: receiving a memory address and an encrypted value, wherein the encrypted value is read from the memory address; decrypting the encrypted value using the memory address as an initial value for a decryption process; and providing the decrypted value to a processor core.
Particular implementations of the encryption/decryption process provide one or more of the following advantages: 1) encrypting/decrypting memory accesses without data size restrictions; 2) encrypting/decrypting memory accesses without order restrictions; 3) improved bandwidth for encrypted/decrypted memory accesses; and 4) encrypting/decrypting data without requiring an initial value from a user.
The details of one or more disclosed implementations are set forth in the accompanying drawings and the description below. Other features, aspects, and advantages will become apparent from the description, the drawings and the claims.
The microprocessor core 102 can be any appropriate microprocessor core. For example, the microprocessor core can be an ARM-based core or a digital signal processor (DSP) core. The microprocessor core 102 can communicate with external devices via the DMA controller 104 and LCD controller 106. For example, the microprocessor core 102 can control a LCD display via the LCD controller 106 and can read/write data from an external memory device (e.g., an off-chip flash memory device, a frame buffer, a hard drive, a memory mapped port, etc.) via the DMA controller 104.
The microprocessor core 102, the DMA controller 104 and the LCD controller 106 can interact with the external devices via the memory controller 108. For example, the LCD controller 106 can write data into a frame buffer using the memory controller 108, and the DMA controller 104 can read a large block of data from the external memory device using the memory controller 108.
The system bus matrix 116 can connect the microprocessor core 102, the DMA controller 104, the LCD controller 106 and the memory controller 108. For example, the system bus matrix 116 can include MC_bus 120 that connects the microprocessor core 102 to the memory controller via mux 118; DMA_bus 122 that connects the DMA controller to the memory controller 108; and the LCD_bus 124 that connects the LCD controller 106 to the memory controller 108. Each bus in the system bus matrix 116 and/or in the system 100 can be various sizes (e.g., eight bits wide, sixteen bits wide, thirty-two bits wide and sixty-four bits wide). For example, MC_bus 120 and buses 126 and 128 can be thirty-two bits wide. Although the buses are thirty-two bits wide, memory accesses are not limited to thirty-bit memory accesses. For example, assuming the external memory device is thirty-two bit memory (e.g., a word sized memory), the microprocessor core 102 can issue byte (eight bit) read/write operations, half word (sixteen bit) read/write operations and word (thirty-two) bit read/write operations (integer multiple of 8 bits).
As indicated above, the microprocessor core 102 can be connected to the memory controller 108 via the mux 118. For example, the mux 118 can route data from the MC_bus 120 to the encryption/decryption processor 114 via bus 126 and data from the encryption/decryption processor 114 to the memory controller 108 via bus 128.
The encryption/decryption processor 114 can encrypt data to be written into external memory devices by the microprocessor core 102. For example, during a write operation to an external memory device, the microprocessor core 102 transmits the write command to the memory controller 108 via the MC_bus 120 and the mux 118. The write command includes a memory address and a data value to be written into the memory address. The mux 118 can connect the microprocessor core 102 to the encryption/decryption processor 114 via bus 126. The encryption/decryption processor 114 can encrypt the data value using the memory address and can provide the encrypted data value and the memory address to the memory controller 108 via bus 128 and mux 118. Although
In addition, the encryption/decryption processor 114 can include a decryption processor (e.g., an encryption/decryption processor) which, in addition to encoding data, can decode encrypted data read from the memory device. For example, the microprocessor core 102 can issue a read operation, which includes a memory address and a data size to be read from the memory address, to the memory controller 108. The mux 118 can connect the memory controller 108 to the decryption processor 114 via bus 128. The encryption/decryption processor 114 can decrypt the encoded data using the memory address and can provide the decrypted data value and to the microcontroller core 102 via bus 126 and mux 118.
The cipher module 204 can be configured to execute any appropriate cipher process. For example, the cipher module 204 can be configured to execute an Advanced Encryption Standard (“AES”) cipher or a Data Encryption Standard (“DES”) cipher. The cipher module 204 can access the address register 202 and use the memory address as an initial value or as an initialization vector. For example, the cipher module 204 can use the memory address associated with the write operation as the initial value or initialization vector. The cipher module 204 can be a stream cipher, similar to the counter mode of the AES standard (e.g., AES CTR mode of operation). However, unlike the counter mode of the AES standard, the cipher module 204 does not need a user-provided initial value (e.g., the cipher module 204 can operate without user input providing an initial value) and data does not need to be processed in the same order. The cipher module 204 outputs an encrypted value (e.g., the encrypted memory address).
With respect to a write command, the XOR operator 206 receives the encrypted memory address and the data value associated with the write operation and performs the XOR operation using the encrypted memory address and the data value (e.g., encrypted data value=data value XOR encrypted memory address). The output of the XOR operator 206 (e.g., the encrypted data value 210) is then output. For example, the encrypted data value 210 can be provided to the memory controller 108 via the bus 128 and mux 118.
With respect to a read command, the XOR operator 206 receives the encrypted memory address and the encrypted data value read from the memory address and performs the XOR operation using the encrypted memory address and the encrypted data value (e.g., decrypted data value=encrypted data value XOR encrypted memory address). The output of the XOR operator 206 (e.g., the decrypted data value 210) is then output. For example, the decrypted data value 210 can be provided to the microcontroller core 102 via the bus 126 and mux 118.
In some implementations, the external memory device is a word memory device (e.g., each memory cell includes four bytes of data). For example,
In addition, the n word memory 300 can be accessed using various data sizes. For example, the memory 300 can be accessed using half-word accesses or double word accesses. The number of bits truncated from the memory address can depend on the size of memory access. For example, if the memory 300 is accessed using half-word accesses, the encoding module 201a can truncate the least significant bit and store the truncated value in the address register 202. As an another example, if the memory 300 is accessed using double word accesses, the encoding module 201a can truncate the three least significant bits.
In some implementations, rather than truncating the memory address, the encoding module 201a can write a value into the memory address. For example, the encoding module 201a can write a predetermined value into the two or four least significant bits of the memory address. The predetermined value can be all 0s or all 1s (e.g., four 0s or two 1s). In some implementations, the encoding module 201 can write a value into one or more bits anywhere in the memory address. For example, the encoding module 201a can write a predetermined value in the three most significant bits of the memory address or in bit position of the memory address.
Then, the memory address is encoded (at 404). For example, the cipher module 204 can access the memory address stored in the address register 204 and encrypt the memory address. In some implementations, the cipher module 204 encrypts the memory address. The cipher module 204 can encrypt the memory address using various encryption algorithms. For example, the cipher module 204 can encrypt the memory address using the AES encryption algorithm or the DES encryption algorithm. The memory address can be used by the encryption/decryption processor 114 as an initial value or initialization vector.
The data value associated with the write operation is encrypted (at 406). For example, the data value associated with the write operation can be encrypted by the XOR operation using the encrypted memory address (e.g., encrypted data value=data value XOR encrypted memory address).
The encrypted data value 210 can be stored in memory (at 408). For example, encryption/decryption processor 114 can provide the encrypted data value 210 to the memory controller 108, which can store the encrypted data value in the memory device (e.g., write the encrypted data value at the memory address associated with the write operation).
Then, the memory address is encoded (e.g., ciphered or encrypted) (at 454). For example, the cipher module 204 can access the memory address stored in the address register 202 and encrypt the memory address. The cipher module 204 can encrypt the memory address using various encryption algorithms. For example, the cipher module 204 can use the AES encryption algorithm or the DES encryption algorithm. The memory address can be used by the encryption/decryption processor 114 as an initial value or initialization vector.
A data value stored at the memory address associated with the read operation is decrypted (at 456). For example, the encrypted data value stored in the memory address can be decrypted by the XOR operation using the encrypted memory address (e.g., decrypted data value=encrypted data value XOR encrypted memory address).
The decrypted data value 210 can be provided to the microcontroller core (at 458). For example, encryption/decryption processor 114 can provide the decrypted data value 210 to the microcontroller core 102, which can use the decrypted data value in a computation, or other operation. In some implementations, the microcontroller core 102 can provide the decrypted data value to another component in the system 100.
In some implementations, the microprocessor core 102 can access consecutive memory addresses (e.g., a burst access). For example, the microprocessor core 102 can access four consecutive words of memory (e.g., read four consecutive words of data from memory or write four consecutive words of data to memory). To take advantage of the four consecutive memory accesses, the encryption/decryption processor 114 can truncate the four least significant bits of the memory address. The truncated memory address can be used as the initial value for the cipher module 204. This can improve the bandwidth of a data transfer because the memory address is processed by the cipher module 204 once for the four words.
For example,
Timing diagram 504 illustrates four consecutive memory accesses, where the four least significant bits of the memory address are truncated before being processed by the cipher module 204. Because the four least significant bits of the memory address are truncated, the memory address does not need to be processed by the cipher module 204 for each memory access. Instead, the memory address is ciphered by the cipher module 204 one time and the ciphered address is used to XOR the remaining data values. As illustrated in
In some implementations, the encryption/decryption processor 114 can include additional security measures. For example,
The scrambled address register 602 is encoded using a random or pseudo-random number (e.g., a nonce 603). For example, the scrambled address and the nonce 603 can be combined via an XOR operator (e.g., encoded address=scrambled address XOR nonce) and the encoded address can be provided to the cipher module 204. The encoded address and the data value can be processed as explained above in connection with
While this document contains many specific implementation details, these should not be construed as limitations on the scope what may be claimed, but rather as descriptions of features that may be specific to particular embodiments. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable sub combination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can, in some cases, be excised from the combination, and the claimed combination may be directed to a sub combination or variation of a sub combination.
Pean, Guillaume, Vergnes, Alain, Douguet, Michel
Patent | Priority | Assignee | Title |
10157283, | Jun 20 2014 | Cypress Semiconductor Corporation | Encryption for XIP and MMIO external memories |
10169618, | Jun 20 2014 | MUFG UNION BANK, N A | Encryption method for execute-in-place memories |
10192062, | Jun 20 2014 | Cypress Semiconductor Corporation | Encryption for XIP and MMIO external memories |
10201396, | Mar 07 2017 | Steris Corporation | Trocar assembly with a cleaning element for use during a laparoscopic procedure |
10368905, | Mar 07 2017 | Steris Corporation | Trocar assembly with a cleaning element for use during a laparoscopic procedure |
10398296, | Mar 07 2017 | Steris Corporation | Trocar assembly with a cleaning element for use during a laparoscopic procedure |
10691838, | Jun 20 2014 | Cypress Semiconductor Corporation | Encryption for XIP and MMIO external memories |
10699031, | Oct 30 2014 | Hewlett Packard Enterprise Development LP | Secure transactions in a memory fabric |
10715332, | Oct 30 2014 | Hewlett Packard Enterprise Development LP | Encryption for transactions in a memory fabric |
10742400, | Mar 20 2015 | Hewlett Packard Enterprise Development LP | Datastream block encryption |
10751085, | May 31 2017 | Steris Corporation | Trocar assembly with a movable cleaning element |
10758267, | May 31 2017 | Steris Corporation | Trocar assembly with a cleaning element for use during a laparoscopic procedure |
10764065, | Oct 23 2014 | Hewlett Packard Enterprise Development LP | Admissions control of a device |
11645428, | Feb 11 2020 | WELLS FARGO BANK, N A | Quantum phenomenon-based obfuscation of memory |
11928249, | Feb 11 2020 | Wells Fargo Bank, N.A. | Quantum phenomenon-based obfuscation of memory |
12118132, | Aug 10 2018 | Cryptography Research, Inc. | Memory bus protection |
Patent | Priority | Assignee | Title |
5199074, | Jan 06 1992 | LEGERITY, INC | Encryption system |
7640437, | Dec 04 2002 | Gula Consulting Limited Liability Company | Address encryption method for flash memories |
20030084308, | |||
20050021986, | |||
20070140482, | |||
20100115286, | |||
20100146303, | |||
20100299538, |
Date | Maintenance Fee Events |
Oct 20 2017 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Oct 21 2021 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Date | Maintenance Schedule |
May 13 2017 | 4 years fee payment window open |
Nov 13 2017 | 6 months grace period start (w surcharge) |
May 13 2018 | patent expiry (for year 4) |
May 13 2020 | 2 years to revive unintentionally abandoned end. (for year 4) |
May 13 2021 | 8 years fee payment window open |
Nov 13 2021 | 6 months grace period start (w surcharge) |
May 13 2022 | patent expiry (for year 8) |
May 13 2024 | 2 years to revive unintentionally abandoned end. (for year 8) |
May 13 2025 | 12 years fee payment window open |
Nov 13 2025 | 6 months grace period start (w surcharge) |
May 13 2026 | patent expiry (for year 12) |
May 13 2028 | 2 years to revive unintentionally abandoned end. (for year 12) |